Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
History
                    21 Nov 2024, 08:38
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2023/12/24/1 - Mailing List, Third Party Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2023/12/25/1 - Mailing List, Third Party Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2023/12/29/2 - Mailing List, Mitigation, Third Party Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2024/01/01/1 - Mailing List, Third Party Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2024/01/01/2 - Mailing List, Third Party Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2024/01/01/3 - Mailing List, Third Party Advisory | |
| References | () https://bugs.exim.org/show_bug.cgi?id=3063 - Issue Tracking, Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2255852 - Issue Tracking, Third Party Advisory | |
| References | () https://exim.org/static/doc/security/CVE-2023-51766.txt - Broken Link | |
| References | () https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html - Technical Description | |
| References | () https://git.exim.org/exim.git/commit/5bb786d5ad568a88d50d15452aacc8404047e5ca - Patch | |
| References | () https://git.exim.org/exim.git/commit/cf1376206284f2a4f11e32d931d4aade34c206c5 - Patch | |
| References | () https://github.com/Exim/exim/blob/master/doc/doc-txt/cve-2023-51766 - Mitigation, Vendor Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html - Mailing List, Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/ - Mailing List, Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/ - Mailing List, Third Party Advisory | |
| References | () https://lwn.net/Articles/956533/ - Third Party Advisory | |
| References | () https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ - Technical Description, Third Party Advisory | |
| References | () https://www.openwall.com/lists/oss-security/2023/12/23/2 - Issue Tracking, Mailing List, Third Party Advisory | |
| References | () https://www.youtube.com/watch?v=V8KPV96g1To - Exploit | 
02 Feb 2024, 02:22
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
| References | () https://lwn.net/Articles/956533/ - Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/ - Mailing List, Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/ - Mailing List, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html - Mailing List, Third Party Advisory | |
| References | () https://www.youtube.com/watch?v=V8KPV96g1To - Exploit | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 5.3 | 
| First Time | Debian Debian debian Linux | 
18 Jan 2024, 03:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
12 Jan 2024, 03:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
05 Jan 2024, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
04 Jan 2024, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
04 Jan 2024, 16:23
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-345 | |
| References | () https://bugs.exim.org/show_bug.cgi?id=3063 - Issue Tracking, Vendor Advisory | |
| References | () https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ - Technical Description, Third Party Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2023/12/29/2 - Mailing List, Mitigation, Third Party Advisory | |
| References | () https://git.exim.org/exim.git/commit/5bb786d5ad568a88d50d15452aacc8404047e5ca - Patch | |
| References | () http://www.openwall.com/lists/oss-security/2024/01/01/2 - Mailing List, Third Party Advisory | |
| References | () https://exim.org/static/doc/security/CVE-2023-51766.txt - Broken Link | |
| References | () https://github.com/Exim/exim/blob/master/doc/doc-txt/cve-2023-51766 - Mitigation, Vendor Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2023/12/24/1 - Mailing List, Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2255852 - Issue Tracking, Third Party Advisory | |
| References | () https://www.openwall.com/lists/oss-security/2023/12/23/2 - Issue Tracking, Mailing List, Third Party Advisory | |
| References | () https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html - Technical Description | |
| References | () http://www.openwall.com/lists/oss-security/2024/01/01/1 - Mailing List, Third Party Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2024/01/01/3 - Mailing List, Third Party Advisory | |
| References | () https://git.exim.org/exim.git/commit/cf1376206284f2a4f11e32d931d4aade34c206c5 - Patch | |
| References | () http://www.openwall.com/lists/oss-security/2023/12/25/1 - Mailing List, Third Party Advisory | |
| CPE | cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 4.3 | 
| First Time | Exim exim Fedoraproject extra Packages For Enterprise Linux Fedoraproject Fedoraproject fedora Exim | 
02 Jan 2024, 01:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
01 Jan 2024, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
01 Jan 2024, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not. | |
| References | 
 | 
29 Dec 2023, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
26 Dec 2023, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
26 Dec 2023, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | |
| Summary | Exim through 4.97 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not. | 
24 Dec 2023, 12:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
24 Dec 2023, 06:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-12-24 06:15
Updated : 2024-11-21 08:38
NVD link : CVE-2023-51766
Mitre link : CVE-2023-51766
CVE.ORG link : CVE-2023-51766
JSON object : View
Products Affected
                fedoraproject
- extra_packages_for_enterprise_linux
- fedora
debian
- debian_linux
exim
- exim
CWE
                
                    
                        
                        CWE-345
                        
            Insufficient Verification of Data Authenticity
